Font Size: a A A

Research Of Attack Technology Of Hash Function MD5

Posted on:2011-10-29Degree:MasterType:Thesis
Country:ChinaCandidate:S H ChenFull Text:PDF
GTID:2178360302491626Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Hash function is a very important and basic tool in the field of information security, widely applied in the areas of the digital signature and identity authentication. MD5 algorithm, as a member of Hash function family, is a typical representative of MD structure and wide used in information security. Therefore, it is helpful to get the basic analysis method of Hash functions to attack other Hash functions through the research of MD5 algorithm.Attack technology of MD5 algorithm is analyzed and researched deeply in this paper. First of all, the main idea of collision attack of MD5 is summarized. The bit-tracking technology is used to analyze and control the differential paths. Meanwhile, the message modification technology is taken advantage of to improve the possibility of searching the messages for collision. Secondly, the construction of the initial structure and the skipping steps is proposed and the technology and method of preimage attack of MD5 is analyzed in detail. Finally, the performances of the Hash functions are summed up and the further research direction is introduced.
Keywords/Search Tags:Hash function, MD5, Collision attack, Preimage attack
PDF Full Text Request
Related items